CVE-2022-28550Out-of-bounds Write in Jhead

Severity
9.8CRITICALNVD
EPSS
0.1%
top 69.11%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJun 13

Description

Matthias-Wandel/jhead jhead 3.06 is vulnerable to Buffer Overflow via shellescape(), jhead.c, jhead. jhead copies strings to a stack buffer when it detects a &i or &o. However, jhead does not check the boundary of the stack buffer. As a result, there will be a stack buffer overflow problem when multiple `&i` or `&o` are given.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 3.9 | Impact: 5.9

Affected Packages3 packages

debiandebian/jhead< jhead 1:3.08-1 (forky)
Debianjhead_project/jhead< 1:3.08-1+1

Patches

🔴Vulnerability Details

2
OSV
CVE-2022-28550: Matthias-Wandel/jhead jhead 32023-06-13
GHSA
GHSA-phqx-gjxc-wrp9: Matthias-Wandel/jhead jhead 32023-06-13

📋Vendor Advisories

1
Debian
CVE-2022-28550: jhead - Matthias-Wandel/jhead jhead 3.06 is vulnerable to Buffer Overflow via shellescap...2022
CVE-2022-28550 — Out-of-bounds Write in Debian Jhead | cvebase